IT Management  >   Systems Operations  >  

Security

RSS Feed   
ALSO CALLED: System Security, Closed Loop Security, Systems Security, Computer Security, Active Security Solutions
DEFINITION: Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications. Several major hardware manufacturers and software vendors, collectively known as the Trusted Computing Group (TCG), are cooperating in this venture and have come up with specific plans. The TCG develops and promotes  … 

Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Reports
201 - 225 of 3777 Matches Previous Page  |  Next Page
Expanding the Sphere of Supervision Value
sponsored by Smarsh
WHITE PAPER: Download this guide to learn more about how information risk affects organizations of all types, the expanded value of supervision software for more than FINRA risk, and how Smarsh can help protect your organization from these risks.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Smarsh

BigFix Endpoint Management
sponsored by HCL Software
DATA SHEET: IT security and operations teams are pitted against a fast-evolving threat landscape, and as a result, they must be ready to roll out preventative and remedial measures when a threat becomes present. Glance at this data sheet to see how HCL’s BigFix Endpoint Management aims to improve security postures across organizations.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

HCL Software

IDaaS Buyers’ Guide
sponsored by CyberArk Software, Inc
EGUIDE: As workforces grew more remote, traditional perimeter defenses became obsolete – which ultimately led to the decline of network-based IAM solutions. Today’s distributed workers require security that scales as they do… enter identity as-a-service (IDaaS). Read this buyers’ guide to learn more about IDaaS and how to choose the right solution.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

CyberArk Software, Inc

Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER: IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: In their 11th official State of Software Security report, Veracode looks at what kind of impact the decisions developers make have on software security. Explore the top security concerns of the year—and learn how to navigate around them—here.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Veracode, Inc.

BigFix: Ensuring Continuous Compliance of Security & Regulatory Policies
sponsored by HCL Software
PRODUCT OVERVIEW: For IT and security teams, managing endpoints, minimizing cyberthreats and ensuring continuous compliance is a complex – and expensive – pursuit. BigFix Compliance looks to address this issue by helping organizations address these challenges. Read this solution brief to explore the key features and capabilities of BigFix Compliance.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

HCL Software

Garancy IAM Suite: Identity & Access Management Solution for Dynamic Companies
sponsored by Beta Systems
DATA SHEET: According to Carnegie Mellon, insider attacks are causing almost 200% more damage on average per case than attacks coming from outside. So it must be asked – is your identity and access management (IAM) up to snuff? If you feel as though your IAM suite could use a lookover or even a re-tool, read this data sheet and see what you may be missing.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Beta Systems

Beat Cybercriminals at Their Own Game
sponsored by Trend Micro
EBOOK: The number of vulnerabilities published every year continues to grow. MITRE’s Common Vulnerabilities and Exposures (CVE) List included 894 CVEs in 1999, 6,447 CVEs published in 2016, and 21,273 in 2019. This is why vulnerability research is growing, and by reading this e-book, you can get a sense of what this research can accomplish.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Trend Micro

AT&T Global Security Gateway
sponsored by AT&T and Palo Alto
DATA SHEET: Businesses have taken advantage of the benefits of SaaS applications, but they’ve had to mitigate the resulting increase in network traffic by connecting users directly to the internet. Although this solves the latency dilemma, it lessens visibility and weakens cybersecurity overall. Scan this data sheet to view a potential remedy from AT&T.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

AT&T and Palo Alto

Sensitive Data Protection in the Retail Card Payments Ecosystem
sponsored by Thales
WHITE PAPER: Securing sensitive data in a cost-effective manner is a significant challenge in processing payment transactions. Year after year, the threat landscape widens as fraudsters think of more sophisticated methods to compromise payment credentials for monetary gain. View this white paper to learn about keeping payment transactions secure.
Posted: 02 Nov 2020 | Published: 30 Sep 2020

Thales

Isolation Best Practices for Financial Services Institutions
sponsored by Menlo Security
WHITE PAPER: Phishing and ransomware attacks, while not necessarily new, are becoming increasingly sophisticated, hard to detect, and dangerous. Read these isolation best practices for yourself to learn how smart financial service institutions are applying this relatively simple concept to stop dangerous attacks before they can reach vulnerable users.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Menlo Security

How to Build an Effective IAM Architecture
sponsored by Beta Systems
EGUIDE: Identity and access management is changing and so must the strategies for managing it. Inside this e-guide, read up on IAM architecture approaches and how to select the best one for your organization.
Posted: 02 Nov 2020 | Published: 30 Oct 2020

Beta Systems

How to stop threats in an unpredictable world
sponsored by ServiceNow
VIDEO: Learn about new features for ServiceNow Security Operations in the Paris release that address application vulnerability management, predictive intelligence for user-reported phishing, and more.
Posted: 02 Nov 2020 | Premiered: 02 Nov 2020

ServiceNow

The Definitive Guide to Electronic Communications Capture
sponsored by Smarsh
WHITE PAPER: Is your organization under pressure to manage an ever-increasing volume and diversity of communications data? Download this Smarsh Definitive Guide to Capture to learn how your compliance program stacks up, and get the information you need to reduce your organizational risk.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Smarsh

Upgrading Existing Security Systems to Agile Quantum-Safe With Thales Luna HSMs And Thales High-Speed Encryptors
sponsored by Thales
WHITE PAPER: The impending arrival of quantum computing is powerful enough to pose a threat to today’s encryption. View this brief to learn about Thales Luna Hardware Security Modules, Thales High Speed Encryptors, and ISARA’s quantum-safe solutions, which aim to provide quantum-safe security while maintaining backward compatibility with existing systems.
Posted: 02 Nov 2020 | Published: 28 Feb 2020

Thales

Top 10 Considerations When Choosing a Modern Single Sign-On Solution
sponsored by CyberArk Software, Inc
WHITE PAPER: With 80% of all breaches involving compromised or weak credentials, implementing an SSO can provide more robust credential controls and eliminate unnecessary risk. But not all SSO solutions are created equal, and choosing the right one can be challenging. Dive into this white paper to learn the top 10 considerations for selecting an SSO.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

CyberArk Software, Inc

Ransomware State of Play
sponsored by Cylance
WEBCAST: Ransomware is evolving – campaigns are shifting from widespread to highly-targeted, often deployed via compromised MSSP. Additionally, Ransomware-as-a-Service (RaaS) is becoming more private, and threat actors are teaming up to extend their tooling. How can you stay secure? Watch this webcast to learn more about the state of play in ransomware.
Posted: 02 Nov 2020 | Premiered: Nov 2, 2020

Cylance

How SAM Can Improve Your Cyber Security
sponsored by MetrixData 360
WHITE PAPER: IT security teams often overlook software asset management (SAM) as a potential resource in eliminating exposure to cyberthreats. Luckily, this guide can catch everyone up. Learn how SAM can improve your cyber security here.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

MetrixData 360

Five Cloud Security Considerations for CISOs
sponsored by Menlo Security
WEBCAST: You can’t protect against threats you can’t see—and for cloud application security, this alone is the biggest challenge to overcome. According to Menlo Security, 23% of attacks that come from cloud applications are invisible to network administrators. Learn how to strengthen your cloud application security here.
Posted: 02 Nov 2020 | Premiered: Nov 2, 2020

Menlo Security

Securing the Future of Work
sponsored by Menlo Security
WHITE PAPER: Access this white paper to learn the top security threats posed to remote workers, use cases of cloud security that can cover the risk, and 4 steps to deploying a cloud-based secure web gateway (SWG) for remote workers with Menlo Security.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Menlo Security

Electronic Communications Compliance Scary Stories
sponsored by Smarsh
WHITE PAPER: Even the most well-meaning organizations can find themselves in alarming situations if they aren't prepared to retain, monitor, and produce employee communications. The spooky stories outlined in this book detail the horrors of being unprepared for an audit, a legal investigation, or even scarier monsters.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Smarsh

The XDR Payoff: Better Security Posture
sponsored by Trend Micro
ANALYST REPORT: Extended detection and response (XDR) has drawn much attention in recent months due to its ability to aggregate, correlate and analyze signals across multiple security controls. For some organizations, this could mean an improved security posture. Read this ESG report to view an analysis of the prospective value of XDR in numbers.
Posted: 02 Nov 2020 | Published: 30 Sep 2020

Trend Micro

How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE: Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020

Beta Systems

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems

Turn Your Phishing Links Into Read Only
sponsored by Menlo Security
WEBCAST: Check out this webcast to uncover the 3 email security limitations of Office 365 and discover how Menlo can ‘air gap” your enterprise network from the pubic web while still allowing employees seamless access to the internet.
Posted: 02 Nov 2020 | Premiered: Nov 2, 2020

Menlo Security
201 - 225 of 3777 Matches Previous Page    7 8 9 10 11 12    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info